# CVE-2020-11492
Proof-of-Concept (PoC) for Docker Desktop for Windows privilege escalation vulnerability. This vulnerability was
patched in Docker version 2.3.0.2 on May 11th, 2020.
This PoC performs the following:
- creates a named pipe mimicking docker named pipe `\\.\\pipe\\dockerLifecycleServer`,
- call `ImpersonateNamedPipeClient` after connection from docker service,
- retrieve and duplicate the impersonated access token from the current thread,
- launch a new process with the token. The new process will run as `SYSTEM`.
# References
- https://www.pentestpartners.com/security-blog/docker-desktop-for-windows-privesc-cve-2020-11492/
[4.0K] /data/pocs/bcf8d7e4b63441d4e2c019b0c0db6a7360bebee9
├── [4.0K] CVE-2020-11492
│ ├── [3.7K] CVE-2020-11492.cpp
│ ├── [7.2K] CVE-2020-11492.vcxproj
│ └── [1.0K] CVE-2020-11492.vcxproj.filters
├── [5.8M] cve-2020-11492.gif
├── [1.4K] CVE-2020-11492.sln
└── [ 650] README.md
1 directory, 6 files